@haxor@derp.fooMB to Hacker News@derp.fooEnglish • 9 months ago4-year campaign backdoored iPhones using possibly most advanced exploit everarstechnica.comexternal-linkmessage-square3fedilinkarrow-up120arrow-down12file-textcross-posted to: privacy@programming.devtechnology@lemmy.ziptechnology@lemmy.worldhackernews@lemmy.smeargle.fans
arrow-up118arrow-down1external-link4-year campaign backdoored iPhones using possibly most advanced exploit everarstechnica.com@haxor@derp.fooMB to Hacker News@derp.fooEnglish • 9 months agomessage-square3fedilinkfile-textcross-posted to: privacy@programming.devtechnology@lemmy.ziptechnology@lemmy.worldhackernews@lemmy.smeargle.fans
minus-square@Quacksalber@sh.itjust.workslinkfedilinkEnglish4•9 months agoClosed-source hardware and software, like a pinata of vulnerability. You never know when and how you’re hit.
Closed-source hardware and software, like a pinata of vulnerability. You never know when and how you’re hit.